Classification of Handwritten Signatures Based on Name Legibility

Size: px
Start display at page:

Download "Classification of Handwritten Signatures Based on Name Legibility"

Transcription

1 Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de Cantoblanco, C/ Francisco Tomas y Valiente 11, Madrid, Spain ABSTRACT An automatic classification scheme of on-line handwritten signatures is presented. A Multilayer Perceptron (MLP) with a hidden layer is used as classifier, and two different signature classes are considered, namely: legible and non-legible name. Signatures are represented considering different feature subsets obtained from global information. Mahalanobis distance is used to rank the parameters and feature selection is then applied based on the top ranked features. Experimental results are given on the MCYT signature database comprising 330 signers. It is shown experimentally that automatic on-line signature classification based on the name legibility is feasible. Keywords: Biometrics, classification, on-line signature, neural network, verification 1. INTRODUCTION Thanks to its common use in many different applications, handwritten signature is one of the most widely accepted authentication methods. 1 It covers to some extent all of the main characteristics of a biometric trait (i.e., universality, distinctiveness, permanence and collectability 2 ) so it is feasible to develop automatic recognition systems based on it. 3, 4 Two main approaches to the representation of signatures have been reported in literature 5 : i) off-line: in which only the final result (i.e., the image) of the signature is available, 3 and ii) on-line: the signature is acquired with a special digitizing tablet which provides the temporal dynamics of the signature. 4 In this paper we will focus on the latter approach, in which much richer information about the signature is available. The present work is based on the so called occidental signatures. In opposition to other types of signatures consisting of independent symbols, such as the asian signatures, the occidental signatures consist of signs that could form concatenated text and some form of flourish. These can be classified according to different levels of complexity. In some countries the usual habit is to sign with readable written name, while in European countries signature must not necessarily have the readable written name of the signer and may only consist of an elaborated flourish. Examples of asian and occidental signatures can be found in the first International Signature Verification Competition. 6 In Fig. 1 we depict different examples of signatures from the MCYT database, which is used in the experiments. In the top row of Fig. 1 we can see some signatures in which the name is non-readable. The bottom row of Fig. 1 shows some readable signatures. Automatic signature verification systems have been shown to be sensitive to some extent to signature complexity. 7 Recognition rates of some systems drop when coping with easy to forge signatures which are normally the readable ones. Therefore an automatic classification scheme to separate between legible and non-legible signatures would be desirable in order to improve the general performance of the verification system. In this case two different recognition strategies could be applied for legible and non-legible signatures thus maximizing the overall recognition rate. Further author information: (Send correspondence to J.G.-H.) J.G.: javier.galbally@uam.es J.F.: julian.fierrez@uam.es J.O.-G.: javier.ortega@uam.es

2 Figure 1. Signature examples of non-readable (top row) and readable signatures (bottom row). From a privacy point of view, signatures in which the name of the signer is readable could involve a special treatment to protect the identity of the signer. From this perspective, an automatic legibility classification system would be relevant in order to adopt different measures for each signature depending on the specific legal guidelines for privacy protection of each country. 8 This paper is structured as follows. Some related works are presented in Sect. 2. In Sect. 3 we detail the classification scheme followed, which is divided into feature extraction and selection, and neural network classifier. The experimental protocol, some results and further discussion are reported in Sect. 4. Conclusions are finally drawn in Sect RELATED WORKS Some similar efforts to the classification problem introduced in this paper have been made in previous works. In 9 a classification scheme based on two consecutive classifiers is applied to handwritten text. In this work an initial pre-classification is made to discriminate between potentially problematic characters (such as S and 5 ) and then a specific adapted classifier is used for each one of these classes. In a similar way the present work proposes a pre-classification step which may be applied to signature verification in order to apply the most suitable recognition strategy to each signature class. In 10 a new authentication method based on written symbols is introduced and its discriminant capacity is compared to that of signatures. In one of the experiments reported a classifier is used for personal identification in a database in which symbols and signatures are mixed together. Although only one classifier is applied to the whole database, the process could be divided in two different steps: a first step in which symbols are separated from signatures (similar to the legibility classification problem introduced in the present work), and a second step in which each symbol/signature is recognized. An automatic classification system for Tablet PC environments is presented in. 11 In this work experiments using a HMM model are carried out in order to distinguish between graphics and handwritten text in on-line handwritten documents. This is the closest work to the proposed legibility classification scheme found in the literature Feature Extraction 3. CLASSIFICATION SCHEME In the literature we can mainly find two different approaches to the problem of extracting relevant information from on-line signature data 12 :

3 Table 1. Set of global features considered in this work sorted by individual discriminative power. Some notation considerations are: T denotes time interval, t denotes time instant, N denotes number of events, v denotes velocity and a denotes acceleration. Ranking Feature Description Ranking Feature Description 1 signature total duration T s 2 N(pen-ups) 3 N(sign changes of dx/dt and dy/dt) 4 average jerk j 5 standard deviation of a y 6 standard deviation of v y 7 (standard deviation of y)/ y 8 N(local maxima in x) 9 standard deviation of a x 10 standard deviation of v x 11 j rms 12 N(local maxima in y) 13 t(2nd pen-down)/t s 14 (average velocity v)/v x,max 15 A min =(y max y min )(x max x min ) ( x= P pen-downs i=1 (x max i x min i )) y 16 (x last pen-up x max )/ x 17 (x 1st pen-down x min )/ x 18 (y last pen-up y min )/ y 19 (y 1st pen-down y min )/ y 20 (T w v)/(y max y min ) Function-based approaches, in which time sequences describing local properties of the signature are used for recognition. 13 Feature-based approaches, in which a holistic vector representation consisting of global features is derived from the acquired signature trajectories. 14 In the present work, in order to classify the on-line signatures based on name legibility, we focus on the latter approaches. The device used in the signature acquisition process was a WACOM pen tablet which provided five different discrete-time dynamic sequences. In the experiments only features extracted from the first three sequences were used, the two involving angles were discarded as they have shown to be very unstable in some recognition systems. 4 The five dynamic sequences are: Position in x-axis. Position in y-axis. Pressure p applied by the pen. Azimuth angle of the pen with respect to the tablet. Altitude angle of the pen with respect to the tablet. The complete set of global features used in the experiments is given in Table 1. This group of parameters is a subset of the features considered in. 4 The work described in 4 was also carried out on the MCYT database, where users were asked to sign within a grid, so a controlled signature acquisition is assumed in order to reduce as much as possible the undesired effects produced by non-invariant translation/rotation features. In case of a non-controlled acquisition environment, translation/rotation registration should be performed before computing the feature set. The features in Table 1 are sorted according to the Mahalanobis distance criterion described in Sect All the features were normalized to zero mean and unit variance before using them as the input to the classifier.

4 3.2. Feature Selection In order to check for possible improvements in the recognition rate depending on the number of features selected as input to the classifier, all the 20 parameters considered have been ranked according to scalar inter-user class separability as described in. 4 Feature selection is then based on the top ranked features. The ranking criterion is based on the maximization of expression S(F k ) = d M i,f k d M j,f k, (1) i=1 j=1 where d M i,f k is the Mahalanobis distance between the F k -parameterized training signatures of client i and the mean of the F k -parameterized complete set of development signatures Neural Network Classifier The proposed classifier is a Multilayer Perceptron (MLP) with one hidden layer of M elements, and a backpropagation training scheme. The input layer is formed by N elements (being N the cardinality of the selected subset of features) with just two neurons in the output layer. The activation functions for each of the layers are: In the hidden layer a hiperbolic tangent: f(u) = a tanh(b u). In the output layer a sigmoid: g(u) = 1/(1 + e u ). In both cases a weighted linear combination is adopted for the net function of each neuron i: u = L wjy i j i + θ i, (2) j=1 where yj i is the j-th input of neuron i, wi j the corresponding weight to that input, L {M, N} is the number of elements of the previous layer and θ i is the bias used to model the threshold. The number of weights to be computed in the training of the MLP can be calculated as NM + 2M, being M + 2 the number of bias elements. In order to get linear performance of the classifier in the [-1,1] range, the two parameters a and b of the hidden layer activation function were computed following the directives given in 15 : a = and b = 2/ Database 4. EXPERIMENTS MCYT bimodal database involves fingerprint and signature traits 16 and it comprises 330 individuals acquired in the four institutions participating in the MCYT project. Approximately half of the donors were captured in the first institution and the other half in the remaining three. In the experiments carried out for the present paper only the signature subcorpus of the MCYT bimodal database is used. Each of the 330 target users produced 25 genuine signatures, and 25 skilled forgeries. In this work we use all of the = 8250 original signatures and no forgeries. In 16 an in depth description of the MCYT database with details of the software used and the acquisition process can be found. Example data from the MCYT Signature database are shown in Fig. 2.

5 Elev Elev Elev Az Az Az P P P Y Y Y X X X t (sec) t (sec) t (sec) Figure 2. Signature examples from MCYT Signature database together with their dynamic sequences captured with a WACOM pen tablet Experimental Protocol All the 8250 signatures considered in the experiments were labeled by hand as legible or non-legible. The network output [O 1 O 2 ]=[0 1] was assigned to non-legible signatures (class C 0 ), and [O 1 O 2 ]=[1 0] to legible signatures (class C 1 ). Both outputs of the Neural Network, O 1 and O 2, are real numbers in the [0,1] range. The final decision rule is as follows: If O 1 < O 2 X is assigned to C 0 If O 1 > O 2 X is assigned to C 1 where X is the pattern (signature) to be classified. Both classes are approximately a priori equally probable (162 signatures were manually assigned to class C 0 and 168 to class C 1 ). Note that the legibility of a signature is subjective and that two different persons might include the same signature in different classes. Thus, a perfect recognition rate can not be expected from any classifier. The MLP classification performance measures have been computed using 2-fold cross-validation as follows: 1. A first recognition rate T 1 is computed using the first half of the patterns (i.e., patterns from 1 to 165) for the training of the Neural Network using the manually labeled ground truth, and the second half (that is patterns from 166 to 330) for testing. 2. A second recognition rate T 2 is computed the opposite way as T 1, i.e. the second half of the patterns is used for the training and the first half for the testing. 3. The final recognition rate of the classifier was obtained linearly combining the previous two, T = T 1 + T 2. (3) 2

6 4.3. Results In Table 2 the recognition rates for increasing values of N (number of features for each signature) and M (number of elements in the hidden layer of the MLP) are given. We first observe from Table 2 that up to N = 15 the recognition rate increases with the number of features selected as input to the MLP. However, once this point is reached more input features worsens the classifier performance. This effect is depicted on the left plot of Fig. 3, where results for fixed M = 5 are given. In this plot we can see a maximum in the performance of the classifier for N = 15. In Table 2 we can also observe an over-fitting effect, as the training set recognition rate increases with the number of elements of the hidden layer, while the recognition rate for the test set reaches a maximum for M = 5 and then decreases. This effect is depicted in the right plot of Fig. 3 where the solid line shows the recognition rate on the test set (with a maximum in M = 5) and the dashed line shows the recognition rate on the training set. These results were obtained with fixed N = 15. From the previous observations the best configuration of the MLP is N = 15 and M = 5. architecture a recognition rate of % is reached. With this Further experiments for this same configuration were carried out changing the test and training sets selection scheme. Again a 2-fold cross-validation strategy was followed. In this case T 1 was computed using signatures from the odd users for training the neural network, and signatures from the even users as the test set. T 2 was computed exchanging both sets of data. This way we avoid the mismatch resulting from using all the signatures of the database acquired in one institution (the first 145 users, as described in Sect. 4.1) for the training and the signatures from other sites as testing data. With this testing strategy the classifier performance was % Dicussion As remarked before the on-line signature legibility classification problem is subject to human opinion: even two different experts would not label all signatures in the same class. As an example signatures in Fig. 4, which were wrongly classified by the MLP, do not clearly belong to either of the classes. Signatures from the top row were manually labeled as non-legible, however some signs that could be interpreted as readable text can be observed. The classifier assigned them to class C 1 (legible). Although the name is not clearly legible, signatures from the bottom row were labeled as legible while the MLP interpreted them as non-legible. 5. CONCLUSIONS An automatic on-line signature classification system was presented. Two different classes were considered, namely: legible and non-legible, and a Multilayer Perceptron (MLP) with a hidden layer was used as classifier. Signatures were parameterized considering different feature subsets obtained from global information and results were given on the whole MCYT signature database (330 signers). It has been shown experimentally that automatic on-line signature legibility classification is feasible. In order to increase recognition rates the system is being improved by the incorporation of local information of the signatures. This type of system could be helpful as a pre-processing step in signature verification systems or in privacy-preserving related applications. ACKNOWLEDGMENTS J. G.-H. is supported by a FPU Fellowship from the Ministerio de Educacion y Ciencia (Spanish Ministry of Science) and J. F.-A. is supported by a FPI Fellowship from Comunidad de Madrid. This work was supported by the Spanish Ministry of Science and Technology under project TIC C05-01 and the European Network of Excellence Biosecure (IST ).

7 Table 2. Classification performance of the MLP for increasing values of N (number of features) and M (number of elements in the hidden layer). Recognition rates on the test set appear in bold and on the train set in plain text. M N CURSE OF DIMENSIONALITY 95 Test Train OVER FITTING Recognition rate 75 Recognition rate N M Figure 3. Graphics of the curse of dimensionality (left) and over-fitting (right) effects observed in the experiments.

8 Figure 4. Signature examples wrongly classified using the best classifier configuration. In the top row signatures that were manually labeled in class C 0 (non-legible) and were assigned to class C 1 by the MLP are shown. The opposite error occurred on signatures shown in the bottom row. REFERENCES 1. M. C. Fairhurst, Signature verification revisited: promoting practical exploitation of biometric technology, Electronics and Communication Engineering Journal 9, pp , December A. K. Jain, A. Ross, and S. Prabhakar, An introduction to biometric recognition, IEEE Trans. on Circuits and Systems for Video Technology 14, pp. 4 20, January J. Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia, An off-line signature verification system based on fusion of local and global information, in BIOAW, LNCS-3087, pp , Springer, J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, J. Ortega-Garcia, and D. Maltoni, An on-line signature verification system based on fusion of local and global information, in AVBPA, LNCS-3546, pp , Springer, R. Plamondon and S. N. Srihari, On-line and off-line handwriting recognition: a comprehensive survey, IEEE Trans. on Pattern Analysis and Machine Intelligence 22, pp , January D.-Y. Yeung, H. Chang, et al., SVC2004: First International Signature Verification Competition, in ICBA, LNCS-3072, pp , Springer, J. Fierrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, Target dependent score normalization techniques and their application to signature verification, IEEE Trans. on Systems, Man, and Cybernetics 35, pp , M. Rejman-Greene, Biometric systems: technology, design and performance evalutation, ch. Privacy issues in the application of biometrics: a European perspective, pp Springer, M. Fairhurst and A. F. Rahman, Generalised approach to the recognition of structurally similar handwritten characters using multiple expert clasifiers, IEE Proc. Vis. Image Signal Process. 144, pp , February M. G. Lizarraga and L. L. Ling, Biometric personal authentication based on handwritten signals, in ICBA, LNCS-3072, pp , Springer, C. M. Bishop, M. Svensen, and G. E. Hilton, Distinguishing text form graphics in on-line handwritten ink, in IWFHR-9, 2004.

9 12. R. Plamondon and G. Lorette, Automatic signature verification and writer identification: The state of the art, Pattern Recognition 22(2), pp , J. Ortega-Garcia, J. Fierrez-Aguilar, J. Martin-Rello, and J. Gonzalez-Rodriguez, Complete signal modeling and score normalization for function-based dynamic signature verification, in Proc. AVBPA, LNCS- 2688, pp , L. L. Lee, T. Berger, and E. Aviczer, Reliable on-line human signature verification systems, Pattern Analysis and Machine Intelligence 18, pp , S. Haykin, Neural networks: a comprehensive foundation, ch. Multilayer Perceptrons, pp Prentice Hall, J. Ortega-Garcia, J. Fierrez-Aguilar, et al., MCYT baseline corpus: a bimodal biometric database, IEE Proc. Vis. Image Signal Process. 150, pp , December 2003.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

Complexity-based Biometric Signature Verification

Complexity-based Biometric Signature Verification Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation

More information

Evaluating the Biometric Sample Quality of Handwritten Signatures

Evaluating the Biometric Sample Quality of Handwritten Signatures Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.

More information

A novel method to generate Brute-Force Signature Forgeries

A novel method to generate Brute-Force Signature Forgeries A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département

More information

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,

More information

Direct Attacks Using Fake Images in Iris Verification

Direct Attacks Using Fake Images in Iris Verification Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information

Background Pixel Classification for Motion Detection in Video Image Sequences

Background Pixel Classification for Motion Detection in Video Image Sequences Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad

More information

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron Proc. National Conference on Recent Trends in Intelligent Computing (2006) 86-92 A comparative study of different feature sets for recognition of handwritten Arabic numerals using a Multi Layer Perceptron

More information

Writer identification clustering letters with unknown authors

Writer identification clustering letters with unknown authors Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th

More information

Online handwritten signature verification system: A Review

Online handwritten signature verification system: A Review Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.

More information

IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ

IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk Julian FIERREZ [https://atvs.ii.uam.es/fierrez] School of Engineering UNIVERSIDAD AUTONOMA DE MADRID, SPAIN Denver CO, USA, Oct. 3, 2017

More information

Figure 1. Artificial Neural Network structure. B. Spiking Neural Networks Spiking Neural networks (SNNs) fall into the third generation of neural netw

Figure 1. Artificial Neural Network structure. B. Spiking Neural Networks Spiking Neural networks (SNNs) fall into the third generation of neural netw Review Analysis of Pattern Recognition by Neural Network Soni Chaturvedi A.A.Khurshid Meftah Boudjelal Electronics & Comm Engg Electronics & Comm Engg Dept. of Computer Science P.I.E.T, Nagpur RCOEM, Nagpur

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)

More information

An Hybrid MLP-SVM Handwritten Digit Recognizer

An Hybrid MLP-SVM Handwritten Digit Recognizer An Hybrid MLP-SVM Handwritten Digit Recognizer A. Bellili ½ ¾ M. Gilloux ¾ P. Gallinari ½ ½ LIP6, Université Pierre et Marie Curie ¾ La Poste 4, Place Jussieu 10, rue de l Ile Mabon, BP 86334 75252 Paris

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

Online Signature Verification on Mobile Devices

Online Signature Verification on Mobile Devices IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande

More information

Human-Computer Interaction for Biometrics

Human-Computer Interaction for Biometrics Human-Computer Interaction for Biometrics Prof. Julian FIERREZ Universidad Autonoma de Madrid - SPAIN http://atvs.ii.uam.es/fierrez Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Identity and Message recognition by biometric signals

Identity and Message recognition by biometric signals Identity and Message recognition by biometric signals J. Bigun, F. Alonso-Fernandez, S. M. Karlsson, A. Mikaelyan Abstract The project addresses visual information representation, and extraction. The problem

More information

DERIVATION OF TRAPS IN AUDITORY DOMAIN

DERIVATION OF TRAPS IN AUDITORY DOMAIN DERIVATION OF TRAPS IN AUDITORY DOMAIN Petr Motlíček, Doctoral Degree Programme (4) Dept. of Computer Graphics and Multimedia, FIT, BUT E-mail: motlicek@fit.vutbr.cz Supervised by: Dr. Jan Černocký, Prof.

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

Online Signature Verification: A Review

Online Signature Verification: A Review J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

UTSig: A Persian Offline Signature Dataset

UTSig: A Persian Offline Signature Dataset UTSig: A Persian Offline Signature Dataset Amir Soleimani 1*, Kazim Fouladi 2, Babak N. Araabi 1, 3 1 Control and Intelligent Processing Center of Excellence, School of Electrical and Computer Engineering,

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Pattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks

Pattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks Pattern Recognition in Blur Motion Noisy Images using Methods for Response Integration in Ensemble Neural Networks M. Lopez 1, 2 P. Melin 2 O. Castillo 2 1 PhD Student of Computer Science in the Universidad

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749

More information

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON)

Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Handwritten Character Recognition using Different Kernel based SVM Classifier and MLP Neural Network (A COMPARISON) Parveen Kumar Department of E.C.E Lecturer, NCCE Israna Nitin Sharma Department of E.C.E

More information

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad

More information

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

Synergy Model of Artificial Intelligence and Augmented Reality in the Processes of Exploitation of Energy Systems

Synergy Model of Artificial Intelligence and Augmented Reality in the Processes of Exploitation of Energy Systems Journal of Energy and Power Engineering 10 (2016) 102-108 doi: 10.17265/1934-8975/2016.02.004 D DAVID PUBLISHING Synergy Model of Artificial Intelligence and Augmented Reality in the Processes of Exploitation

More information

FingerDOS: A Fingerprint Database Based on Optical Sensor

FingerDOS: A Fingerprint Database Based on Optical Sensor FingerDOS: A Fingerprint Database Based on Optical Sensor FLORENCE FRANCIS-LOTHAI 1, DAVID B. L. BONG 2 1, 2 Faculty of Engineering Universiti Malaysia Sarawak 94300 Kota Samarahan MALAYSIA 1 francislothaiflorence@gmail.com,

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Automatic Speech Recognition (CS753)

Automatic Speech Recognition (CS753) Automatic Speech Recognition (CS753) Lecture 9: Brief Introduction to Neural Networks Instructor: Preethi Jyothi Feb 2, 2017 Final Project Landscape Tabla bol transcription Music Genre Classification Audio

More information

Artificial Neural Networks. Artificial Intelligence Santa Clara, 2016

Artificial Neural Networks. Artificial Intelligence Santa Clara, 2016 Artificial Neural Networks Artificial Intelligence Santa Clara, 2016 Simulate the functioning of the brain Can simulate actual neurons: Computational neuroscience Can introduce simplified neurons: Neural

More information

Colored Rubber Stamp Removal from Document Images

Colored Rubber Stamp Removal from Document Images Colored Rubber Stamp Removal from Document Images Soumyadeep Dey, Jayanta Mukherjee, Shamik Sural, and Partha Bhowmick Indian Institute of Technology, Kharagpur {soumyadeepdey@sit,jay@cse,shamik@sit,pb@cse}.iitkgp.ernet.in

More information

Partial Discharge Classification Using Novel Parameters and a Combined PCA and MLP Technique

Partial Discharge Classification Using Novel Parameters and a Combined PCA and MLP Technique Partial Discharge Classification Using Novel Parameters and a Combined PCA and MLP Technique C. Chang and Q. Su Center for Electrical Power Engineering Monash University, Clayton VIC 3168 Australia Abstract:

More information

Chapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction

Chapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction Chapter 2 Transformation Invariant Image Recognition Using Multilayer Perceptron 2.1 Introduction A multilayer perceptron (MLP) [52, 53] comprises an input layer, any number of hidden layers and an output

More information

An Offline Handwritten Signature Verification System - A Comprehensive Review

An Offline Handwritten Signature Verification System - A Comprehensive Review An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Target Classification in Forward Scattering Radar in Noisy Environment

Target Classification in Forward Scattering Radar in Noisy Environment Target Classification in Forward Scattering Radar in Noisy Environment Mohamed Khala Alla H.M, Mohamed Kanona and Ashraf Gasim Elsid School of telecommunication and space technology, Future university

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats

A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats sensors Article A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats Javier Tejedor 1,, Javier Macias-Guarasa 2, *, Hugo F. Martins 1, Daniel Piote 1, Juan Pastor-Graells

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Current Harmonic Estimation in Power Transmission Lines Using Multi-layer Perceptron Learning Strategies

Current Harmonic Estimation in Power Transmission Lines Using Multi-layer Perceptron Learning Strategies Journal of Electrical Engineering 5 (27) 29-23 doi:.7265/2328-2223/27.5. D DAVID PUBLISHING Current Harmonic Estimation in Power Transmission Lines Using Multi-layer Patrice Wira and Thien Minh Nguyen

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

A Data-Embedding Pen

A Data-Embedding Pen A Data-Embedding Pen Seiichi Uchida Λ, Kazuhiro Tanaka Λ, Masakazu Iwamura ΛΛ, Shinichiro Omachi ΛΛΛ, Koichi Kise ΛΛ Λ Kyushu University, Fukuoka, Japan. ΛΛ Osaka Prefecture University, Osaka, Japan. ΛΛΛ

More information

Using RASTA in task independent TANDEM feature extraction

Using RASTA in task independent TANDEM feature extraction R E S E A R C H R E P O R T I D I A P Using RASTA in task independent TANDEM feature extraction Guillermo Aradilla a John Dines a Sunil Sivadas a b IDIAP RR 04-22 April 2004 D a l l e M o l l e I n s t

More information

Disruption Classification at JET with Neural Techniques

Disruption Classification at JET with Neural Techniques EFDA JET CP(03)01-65 M. K. Zedda, T. Bolzonella, B. Cannas, A. Fanni, D. Howell, M. F. Johnson, P. Sonato and JET EFDA Contributors Disruption Classification at JET with Neural Techniques . Disruption

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

Live Hand Gesture Recognition using an Android Device

Live Hand Gesture Recognition using an Android Device Live Hand Gesture Recognition using an Android Device Mr. Yogesh B. Dongare Department of Computer Engineering. G.H.Raisoni College of Engineering and Management, Ahmednagar. Email- yogesh.dongare05@gmail.com

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

Background Subtraction Fusing Colour, Intensity and Edge Cues

Background Subtraction Fusing Colour, Intensity and Edge Cues Background Subtraction Fusing Colour, Intensity and Edge Cues I. Huerta and D. Rowe and M. Viñas and M. Mozerov and J. Gonzàlez + Dept. d Informàtica, Computer Vision Centre, Edifici O. Campus UAB, 08193,

More information

A Novel Fuzzy Neural Network Based Distance Relaying Scheme

A Novel Fuzzy Neural Network Based Distance Relaying Scheme 902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new

More information

AN ANN BASED FAULT DETECTION ON ALTERNATOR

AN ANN BASED FAULT DETECTION ON ALTERNATOR AN ANN BASED FAULT DETECTION ON ALTERNATOR Suraj J. Dhon 1, Sarang V. Bhonde 2 1 (Electrical engineering, Amravati University, India) 2 (Electrical engineering, Amravati University, India) ABSTRACT: Synchronous

More information

Handwritten Signature Verification by Multiple Reference Sets

Handwritten Signature Verification by Multiple Reference Sets Handwritten Signature Verification by Multiple s D. Impedovo (^)( ), R. Modugno (*)( ),G. Pirlo (*)( ) (*) ( ), E. Stasolla (*) Dipartimento di Informatica Università degli Studi di Bari Via Orabona 4

More information

Transactions on Information and Communications Technologies vol 1, 1993 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 1, 1993 WIT Press,   ISSN Combining multi-layer perceptrons with heuristics for reliable control chart pattern classification D.T. Pham & E. Oztemel Intelligent Systems Research Laboratory, School of Electrical, Electronic and

More information

A Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections

A Comparison of Particle Swarm Optimization and Gradient Descent in Training Wavelet Neural Network to Predict DGPS Corrections Proceedings of the World Congress on Engineering and Computer Science 00 Vol I WCECS 00, October 0-, 00, San Francisco, USA A Comparison of Particle Swarm Optimization and Gradient Descent in Training

More information

Neural Network Classifier and Filtering for EEG Detection in Brain-Computer Interface Device

Neural Network Classifier and Filtering for EEG Detection in Brain-Computer Interface Device Neural Network Classifier and Filtering for EEG Detection in Brain-Computer Interface Device Mr. CHOI NANG SO Email: cnso@excite.com Prof. J GODFREY LUCAS Email: jglucas@optusnet.com.au SCHOOL OF MECHATRONICS,

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

DIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS

DIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS DIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS K. Vinoth Kumar 1, S. Suresh Kumar 2, A. Immanuel Selvakumar 1 and Vicky Jose 1 1 Department of EEE, School of Electrical

More information

forensic document examination of electronically captured signatures

forensic document examination of electronically captured signatures Article: forensic document examination of electronically captured signatures By Heidi H. Harralson Biodynamic signature systems are a means by which a person provides a signature in electronic format that

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization

Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization Journal of Physics: Conference Series PAPER OPEN ACCESS Evaluation of Waveform Structure Features on Time Domain Target Recognition under Cross Polarization To cite this article: M A Selver et al 2016

More information

Signature authentication based on human intervention: performance and complementarity with automatic systems

Signature authentication based on human intervention: performance and complementarity with automatic systems IET Biometrics Special Issue: Selected Papers from the International Workshop on Biometrics and Forensics (IWBF2016) Signature authentication based on human intervention: performance and complementarity

More information

Online Signature Verification by Using FPGA

Online Signature Verification by Using FPGA Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used

More information

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,

More information

Sonia Sharma ECE Department, University Institute of Engineering and Technology, MDU, Rohtak, India. Fig.1.Neuron and its connection

Sonia Sharma ECE Department, University Institute of Engineering and Technology, MDU, Rohtak, India. Fig.1.Neuron and its connection NEUROCOMPUTATION FOR MICROSTRIP ANTENNA Sonia Sharma ECE Department, University Institute of Engineering and Technology, MDU, Rohtak, India Abstract: A Neural Network is a powerful computational tool that

More information

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

IBM SPSS Neural Networks

IBM SPSS Neural Networks IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming

More information

3D Face Recognition in Biometrics

3D Face Recognition in Biometrics 3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu

More information

Neural Filters: MLP VIS-A-VIS RBF Network

Neural Filters: MLP VIS-A-VIS RBF Network 6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 432 Neural Filters: MLP VIS-A-VIS RBF Network V. R. MANKAR, DR. A. A. GHATOL,

More information

Acoustic Emission Source Location Based on Signal Features. Blahacek, M., Chlada, M. and Prevorovsky, Z.

Acoustic Emission Source Location Based on Signal Features. Blahacek, M., Chlada, M. and Prevorovsky, Z. Advanced Materials Research Vols. 13-14 (6) pp 77-82 online at http://www.scientific.net (6) Trans Tech Publications, Switzerland Online available since 6/Feb/15 Acoustic Emission Source Location Based

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

Research Article Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis

Research Article Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis e Scientific World Journal, Article ID 381469, 8 pages http://dx.doi.org/10.1155/2014/381469 Research Article Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal

More information

Joint recognition and direction-of-arrival estimation of simultaneous meetingroom acoustic events

Joint recognition and direction-of-arrival estimation of simultaneous meetingroom acoustic events INTERSPEECH 2013 Joint recognition and direction-of-arrival estimation of simultaneous meetingroom acoustic events Rupayan Chakraborty and Climent Nadeu TALP Research Centre, Department of Signal Theory

More information

Adaptive Fingerprint Binarization by Frequency Domain Analysis

Adaptive Fingerprint Binarization by Frequency Domain Analysis Adaptive Fingerprint Binarization by Frequency Domain Analysis Josef Ström Bartůněk, Mikael Nilsson, Jörgen Nordberg, Ingvar Claesson Department of Signal Processing, School of Engineering, Blekinge Institute

More information

Haptic Passwords. Junjie Yan, Kevin Huang, Tamara Bonaci and Howard J. Chizeck

Haptic Passwords. Junjie Yan, Kevin Huang, Tamara Bonaci and Howard J. Chizeck Haptic Passwords Junjie Yan, Kevin Huang, Tamara Bonaci and Howard J. Chizeck Abstract Haptic technologies have made it possible for human users to interact with cyber systems not only via traditional

More information

Motion Recognition in Wearable Sensor System Using an Ensemble Artificial Neuro-Molecular System

Motion Recognition in Wearable Sensor System Using an Ensemble Artificial Neuro-Molecular System Motion Recognition in Wearable Sensor System Using an Ensemble Artificial Neuro-Molecular System Si-Jung Ryu and Jong-Hwan Kim Department of Electrical Engineering, KAIST, 355 Gwahangno, Yuseong-gu, Daejeon,

More information

Scalable systems for early fault detection in wind turbines: A data driven approach

Scalable systems for early fault detection in wind turbines: A data driven approach Scalable systems for early fault detection in wind turbines: A data driven approach Martin Bach-Andersen 1,2, Bo Rømer-Odgaard 1, and Ole Winther 2 1 Siemens Diagnostic Center, Denmark 2 Cognitive Systems,

More information

AN APPROACH ON RECOGNITION OF HAND-WRITTEN LETTERS

AN APPROACH ON RECOGNITION OF HAND-WRITTEN LETTERS AN APPROACH ON RECOGNITION OF HAND-WRITTEN LETTERS Ahmet ÇINAR, Erdal ÖZBAY Fırat University Faculty Of Engineering Computer Engineering 23119 Elazig TURKEY acinar@firat.edu.tr Abstract In this study,

More information

Application of Classifier Integration Model to Disturbance Classification in Electric Signals

Application of Classifier Integration Model to Disturbance Classification in Electric Signals Application of Classifier Integration Model to Disturbance Classification in Electric Signals Dong-Chul Park Abstract An efficient classifier scheme for classifying disturbances in electric signals using

More information

USING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS

USING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS USING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS DENIS F. WOLF, ROSELI A. F. ROMERO, EDUARDO MARQUES Universidade de São Paulo Instituto de Ciências Matemáticas e de Computação

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information